SSU shuts down massive Russian cyber attack against Ukrainian computer network
SSU cyber specialists unmasked the deliberate malware distribution by the Russian special services. The customers were about to hit the computer networks of public authorities, self-local governments and critical infrastructure facilities.
The SSU established that in early June 2020, mass spam was sent with the sender's address changed. In particular, the e-mails, which contained malicious attachments, were sent to a number of government agencies allegedly from the Kyiv Patrol Police Department.
Malicious software launches the installation of the client part of the program (Remote Administration Tool) on the affected computer. Thus, the foreign intelligence service can monitor PC activity remotely. In addition, control and command servers have been installed, including in Russia.
SSU cyber experts recommend an urgent audit of information and telecommunications systems, in particular using indicators published in the MISP-UA Platform to identify its alleged compromise and take appropriate measures.
Compromise indicators:
File name |
sha1 |
sha256 |
|
E-request.rar |
ce4bf04087f7a011ef020fce81d00a393e37f679 |
ad15d2d402b03d0dc0fb55842c8159 b868448b8459b4c468b325c225393cfcf4 |
|
E-request.pdf.rar |
2ed6b02df189dbb1d07d76886957d5f7cdcd1463 |
23388220f257056878c17c5f4f44d1b1a8 478328bbbd14a450ea9bd141021763 |
|
Access code 030621.txt |
e285193b27d5ea1c644973993415bbf9baad86a0 |
bf135c2003dee739fa69e7f2ee7d460d61 edddfff3747920ee0dbeb1c9f311b2 |
|
E-request.pdf.exe |
9480842a7a94c378ed27771c724bada5bdb758c4 |
e065fb7712e0c7a8ba1db464bd8d97443 b10d7162c9930fc5a9576c7871e4c78 |
C&C servers:
- 178.210.76.171 (Ru-Center, Russia),
- 176.9.64.70 (Hetzner, Germany)
- 185.231.68.230 (Zomro, Netherlands)
Domain name:
- «rmssrv.ru»
The connection is made to ports 5651, 8080 and 81
To clean up the affected computers from the specified SPZ you need:
- to stop the service Remote Utilities - Host
- to delete directory C: \ Program Files (x86) \ Remote Utilities - Host \